The Holiday Scam That Cost $60M, And How To Protect Your Business

Holiday business email compromise attacks spike every year because teams are busy, approvals are rushed, and criminals know it. One high‑profile case: in 2024, Orion S.A., a Luxembourg manufacturer, was tricked into sending $60 million via fraudulent wire requests, over half its annual profit, after an employee acted on urgent, “routine” emails. (The Record from Recorded Future)

If a midsize enterprise can be duped, any practice or firm can be. Last year alone, consumers reported $217M lost to gift‑card fraud, a favorite cash‑out for impostors posing as “the boss.” (Federal Trade Commission)

Holiday Business Email Compromise: 5 Scams Employees Must Spot

1) “Your boss needs gift cards – now”

The play: A text or email from the “CEO” asks you to buy and photo gift cards for clients or staff. In Q1 2024, gift‑card schemes made up 37.9% of BEC attacks tracked by industry researchers. Policy: No gift cards without two approvals; execs never request them by text. (APWG Docs)

2) Invoice & payment switch‑ups

The play: “Updated banking details” arrive on a real‑looking vendor thread, right before year‑end. Example: Arlington, MA, lost $445,945 when monthly payments were diverted to criminals. Policy: Verify all banking changes by phone using a known number on file. (WCVB)

3) Fake shipping/delivery notices

The play: “Reschedule delivery” links from UPS/FedEx/USPS. Policy: Go direct, type the carrier’s URL or use saved bookmarks. (Consumer Advice)

4) “Holiday party” attachments

The play: Files like Holiday_Schedule.pdf or Party_List.xls deliver malware. Policy: Block internet macros and scan unexpected attachments. (Microsoft Learn)

5) Bogus holiday fundraisers

The play: Look‑alike charity sites and fake “company match” pages harvest cards and credentials. Policy: Share an approved charity list; route donations through official portals. (CISA)

Why These Attacks Work (and What Stops Them)

Email, online banking, and digital payments make business move fast, and scammers faster. In 2024, the FBI logged 21,442 BEC incidents totaling $2.77B in losses, about $129K per incident. That’s enough to disrupt payroll, holidays, and client trust for a small practice.

The good news: a few layered controls reduce risk dramatically.

  • Multifactor authentication (MFA). Microsoft data shows MFA can block ~99% of account‑takeover attempts. Prioritize app‑based prompts or hardware keys over SMS. (Microsoft)
  • Out‑of‑band verification. The FBI advises verifying any payment request or bank‑detail change by calling a known number (never the one in the email). (Federal Bureau of Investigation)
  • Macro + attachment hygiene. Block internet macros by default and require scanning/approval for unexpected files. (Microsoft Learn)
  • Holiday awareness refresh. Brief your team on these five scams and rehearse your “phone‑call rule.”
  • Use the season as a cue. Microsoft tracks holiday‑period spikes in gift‑card–focused fraud; remind teams before big shopping/shipping weeks. (Microsoft)

Your 10‑Minute Holiday Defense Checklist

  • Two‑person rule: Require verbal confirmation for any transaction over $5,000.
  • Gift‑card policy: “No gift cards by email/text” in writing.
  • Vendor verification: Mandatory callback to a known number for any banking change. (Federal Bureau of Investigation)
  • MFA everywhere: Email, banking, EHR/practice‑management, cloud apps. (Microsoft) “MFA reduces the risk of compromise by 99.22% across the entire population and by 98.56% in cases of leaked credentials” 🛑 Stop waiting or a more efficient use of your time to protect your business.
  • Macro control: Block internet macros; quarantine unexpected attachments. (Microsoft Learn)
  • Rapid response: If funds move, contact your bank and file with IC3.gov immediately. (Internet Crime Complaint Center)

What’s the best holiday cybersecurity strategy for small businesses?
Use layered controls: enforce MFA asap, verify all payment/banking changes by phone, block dangerous attachments/macros, and run a short holiday awareness huddle with real examples. These steps directly counter the most common holiday business email compromise tactics, wire redirects, gift‑card cash‑outs, and fake deliveries.

These practices give you a strong foundation, but true protection comes from a complete IT strategy tailored to your workflows, vendors, and risk profile. That’s where Entech’s proactive IT and vCIO & Account Management team help you align technology with your business goals. We’re known for reliable, friendly, and fast support and for eliminating recurring problems – not just firefighting them.

We’re in IT together & We make IT work for you!

Talk to a real Entech expert.
👉 Schedule your free security assessment

  1. Orion S.A. $60M BEC loss (Aug 2024).
  1. Gift‑card fraud totaled $217M in 2023.
  1. Arlington, MA, vendor‑payment diversion (~$445,946) June 2024.
  1. BEC losses in 2024: $2.77B across 21,442 incidents (~$129K/incident).
  1. MFA effectiveness (~99% block rate).
  1. Gift‑card share of BEC in Q1 2024 (37.9%).